The present invention is directed to solve a problem that time is required for a process related to verification of a public key certificate of a message sender. An in-vehicle device mounted on a vehicle has a memory for holding information of a device which failed in verification of a public key certificate. At the time of performing communication between vehicles or between a vehicle and a roadside device, a check is made to see whether or not information of a device included in a message transmitted matches information of a device which failed and held in the memory. When the information matches, verification of a public key certificate is not performed.
|
5. An in-vehicle communication system authenticating a message with a public key, comprising:
a communication control processing unit; and
a memory,
wherein the communication control processing unit is configured to perform a first check to see whether a verification result of a public key certificate of a message is registered in a memory or not,
wherein each verification result registered in memory is stored with a corresponding valid time value that indicates a time limit for use of the registered verification result,
wherein if the first check indicates that the result is registered in the memory as verification success and a reception time of the message is before the corresponding valid time value, a separate verification process for verifying the public key certificate is omitted and a signature of the message is verified,
if the first check indicates that the result is registered as verification failure,
the processing unit is configured to perform a second check comparing stored values of a public key and a signature of a public key certificate with respective values of a public key and a signature of the public key certificate of the received message,
if the second check indicates that the stored values are the same as the values of the public key and signature of the received message, the message is processed as a failure in verification of the signature in the message without performing the separate verification process,
if the second check indicates that the stored values and the values of the public key and signature of the received message are different, the processing unit is configured to perform the separate verification process on the public key certificate in the received message,
if the separate verification process successfully verifies the received public key certificate, the signature of the received message is also verified by the processing unit,
if the separate verification process fails to verify the received public key certificate, the signature of the received message also fails verification by the processing unit,
wherein the processing unit is configured to store the public key certificate of the message that is not already registered in the memory based on a result of the separate verification process,
wherein the public key certificate of each message is of a certificate authority, including a certificate authority id,
wherein the memory is configured to store a certificate authority id of a previously received message whose public key certificate of the certificate authority has failed verification,
wherein the memory is further configured to store a certificate authority id of a previously received message whose public key certificate of the certificate authority has been successfully verified, and
wherein the processing unit is further configured to:
perform a fourth check to determine whether or not a certificate authority id of the received message matches a certificate authority id registered in the memory as a verification success,
if the fourth check indicates that the certificate authority id of the received message matches a certificate authority id registered in the memory as a verification success, verify the public key certificate of the received message without performing the separate verification process,
if the fourth check indicates that the certificate authority id of the received message does not match a certificate authority id registered in the memory as a verification success, perform a fifth check to determine whether or not the certificate authority id included in the received message matches a certificate authority id registered in the memory as a verification failure, and
if the fifth check indicates that the certificate authority id of the received message matches a certificate authority id registered in the memory as a verification failure, indicating the public key certificate of the received message as having failed verification without performing the separate verification process.
1. An apparatus comprising:
a processing unit configured to receive messages from one or more senders, each message including:
a public key certificate;
a device id specifying a respective sender; and
data to be used when verification of the public key certificate succeeds; and
first and second holding circuits of a verification memory,
the first holding circuit being configured to store a device id and a corresponding first valid time together with a public key and signature of a previously received message whose public key certificate has failed verification,
the second holding circuit being configured to store a device id and a corresponding second valid time together with a public key of another previously received message whose public key certificate has been successfully verified,
wherein the first and second valid times indicate a limit of time for use of the device id stored in the first and second holding circuits, respectively,
wherein the processing unit is configured to, when a message is received at a first time:
check if the device id is stored in the second holding circuit and if the first time is before the second valid time,
if the check indicates that the device id is stored in the second holding circuit and that the first time is before the second valid time, execute a process using data in the received message without performing a separate verification process on the public key certificate of the received message,
if the check indicates that the device id is not stored in the second holding circuit or that the first time is after the second valid time, perform a second check to determine if the device id is stored in the first holding circuit,
if the second check indicates that the device id is stored in the first holding circuit and that the first time is before the first valid time, perform a third check to compare the public key and signature stored with the device id in the first holding circuit to the public key and signature in the public key certificate of the received message,
if the third check indicates that the public key and signature stored with the device id in the first holding circuit are the same as the public key and signature in the public key certificate of the received message, indicating the public key certificate of the received message as having failed verification without performing a separate verification process on the public key certificate, and
if the third check indicates that either of the public key and signature stored with the device id in the first holding circuit are different from the public key and signature in the public key certificate of the received message, performing the separate verification process on the public key certificate of the received message and on an associated certificate authority for the public key certificate,
wherein the processing unit calculates the first valid time and/or the second valid time at a time of storage in the verification memory based on position and/or velocity of the apparatus,
wherein each message has a public key certificate of a certificate authority, including a certificate authority id,
the apparatus further comprising third and fourth holding circuits of the verification memory,
the third holding circuit being configured to store a certificate authority id of a previously received message whose public key certificate of the certificate authority has failed verification,
the fourth holding circuit being configured to store a certificate authority id of a previously received message whose public key certificate of the certificate authority has been successfully verified, and
wherein the processing unit is further configured to:
perform a fourth check to determine whether or not a certificate authority id of the received message matches a certificate authority id stored in the fourth holding circuit,
if the fourth check indicates that the certificate authority id of the received message matches a certificate authority id stored in the fourth holding circuit, verify the public key certificate of the received message without performing the separate verification process,
if the fourth check indicates that the certificate authority id of the received message does not match a certificate authority id stored in the fourth holding circuit, perform a fifth check to determine whether or not the certificate authority id included in the received message matches a certificate authority id stored in the third holding circuit, and
if the fifth check indicates that the certificate authority id of the received message matches a certificate authority id stored in the third holding circuit, indicate the public key certificate of the received message as having failed verification without performing the separate verification process.
2. The apparatus according to
store the device id from the received message in the first holding circuit when the separate verification process does not succeed in verification, and
store the device id in the second holding circuit when the separate verification process succeeds in verification.
3. The apparatus according to
wherein the processing unit is further configured to:
when the separate verification process performed on the public key certificate included in the received message succeeds, store the device id in the second holding circuit, and
when the separate verification process performed on the public key certificate included in the received message fails, store the device id in the first holding circuit.
4. The apparatus according to
wherein the processing unit is further configured to:
when the certificate authority id included in a received message does not match any certificate authority id stored in the third and fourth holding circuits, perform the separate verification process on the public key certificate of the certificate authority included in the received message,
if the separate verification process succeeds, store the certificate authority id in the fourth holding circuit, and,
if the separate verification process fails, store the certificate authority id in the third holding circuit.
6. The in-vehicle communication system according to
7. The in-vehicle communication system according to
wherein whether or not a result of verification of a public key certificate is registered into a memory is determined using at least one of:
travel information of a vehicle sending a message;
setting information of a roadside device sending a message;
travel information of a vehicle receiving a message;
information related to expiration date of a public key certificate of a vehicle or a roadside device transmitting a message; and
information related to reliability level of a public key certificate.
8. The in-vehicle communication system according to
|
The disclosure of Japanese Patent Application No. 2012-226792 filed on Oct. 12, 2012 including the specification, drawings and abstract is incorporated herein by reference in its entirety.
The present invention relates to an in-vehicle communication system and, more particularly, to a technique which can be applied to an in-vehicle communication system using, for example, a public key encryption.
In recent years, aiming at reducing the transportation fatalities, studies of road-to-vehicle/vehicle-to-vehicle communications intended to support safety driving are being conducted. “road-to-vehicle” denotes “between a roadside device and a vehicle”, and “vehicle-to-vehicle” denotes “between a vehicle and a vehicle”. In services related to support of safety driving, the possibility that one erroneous message causes a big accident is high. It is therefore important to recognize that a message is transmitted from a right roadside device or a device mounted on a vehicle (in-vehicle device) and that a message transmitted from a right roadside device or an in-vehicle device is not altered by a malicious person, that is, to assure authenticity/integrity of a message.
One of schemes of assuring authenticity/integrity of message is an electronic signature using public key encryption. The public key encryption is method of performing encryption/decryption by using two keys as a set of a secret key and a public key. Although the secret key has to be managed in secret, the public key may be open. Therefore, in electronic signature using the public key encryption, a sender encrypts hash value (message digest) of a message with a secret key to generate a signature. The message sender transmits the signature together with the message. A message receiver obtains a public key of the sender and decrypts the received signature. The signature is verified by checking whether a decrypted value (hash value) is equal to a hash value generated from the received message.
The electronic signature using the pub is key encryption, has a problem of verification of validity of a public key. Generally, a certificate authority issues public key certificate. A public key certificate is a certificate coupling a public key and information of the owner of the public key, and carries a signature. A key used to generate a signature of a certificate is a secret key of a certificate authority. A message receiver obtains a public key certificate of a message sender and a public key of a certificate authority and verifies the public key, certificate and the signature, thereby verifying the validity of the public key. In this case, verification of validity of the public key of the certificate authority is an for the public key of the certificate authority. To the public key certificate a signature generated by the secret key of the certificate authority itself is designated. In the case where certificate authorities have a hierarchical structure, high-order certificate authority issues public key certificate of a low-order certificate authority.
Therefore, at the time of verifying a signature of message, a public key certificate of each of certificate authorities is verified, the public key certificate of the message send er is verified and, after that, the signature of the message is verified. That is, to verify the signature of the message, the public key certificate verification and signature verification have to be performed a plurality of times. In verification of a public key certificate, checks are made to see whether the certificate is before expiration or not, whether the public key certificate is not altered or not (verification of the signature of the public key certificate succeeds with the public key of the certificate authority or not), whether the certificate is revoked or not, and the like. For example, in the case where the certificate is expired or in the case where the verification of the signature with the public key of the certificate authority fails, it means that the verification of the public key certificate fails.
It takes relatively long time to execute verification of a public key certificate and verification of a signature the other hand in service aiming at support of safety driving, fast-response is required, and high-speed process is demanded for the verification of a public key certificate and signature verification. Techniques for shortening time required for the verification of a public key certificate and signature verification are described in the following patent literatures.
In patent literature 1, in road-to-vehicle communication, a public key certificate of a certificate authority succeeded in public key certificate verification is stored in an in-vehicle device. While a public key certificate of the same certificate authority is received, verification on the public key certificate of the certificate authority is omitted, and a public key certificate of a message sender (a roadside device) and a signature of a message are verified.
In patent literature 2, in vehicle-to-vehicle communication, in the case where a message receiver succeeds in verification of a public key certificate of a message sender, a received public key is stored together with reception time and position information into a memory. In the case where the same public key is received, verification of the public key certificate of the message sender is omitted. In the case where a public key whose present time lapsed for predetermined time since reception time or present position is far from reception position information in the stored in formation, registered information is deleted.
In the patent literatures 1 and 2, a public key certificate succeeded in verification is held. However, a public key certificate failed in verification is, not held. Consequently, for example, in the case where a message is frequently transmitted from a device (an in-vehicle device or a roadside device) holding an illegal public key, there is a problem that verification is performed each time a message is received, and it takes time for the process.
The other problems and novel features will become apparent from the description of the specification and appended drawings.
According to an embodiment, information of a device failed in verification of a public key certificate attached to the information is held in a memory (holding circuit. When a message is received, whether information of a device included in the message matches the information of the device held or not is checked. When there is a match, verification of public key certificates is not performed.
According to the embodiment, verification is not performed on the public key certificate which failed in the preceding verification, so that process time can be prevented from becoming long.
In the following description, the same reference numeral is designated to parts having the same function. For a part which is not described, refer to description of a part to which the same reference numeral is designated.
First, outline of an embodiment will be described with reference to
In the verification failure table 1230, information of device which has failed in verification of the public key certificate is stored. In the public key certificate verifying process 1210, the device information included in the received message M and the device information stored in the verification failure table 1230 is compared. In the case where a match recognized by the comparison, in the public key certificate verifying process 1210, for example, verification of the signature of the public key certificate using a public key of a certificate authority included in the message is not executed. Consequently, the following message can be received and processed. In other words, increase in time required to verify the signature of a message can, be prevented.
Although not limited in the embodiment, information of a device which has succeeded in verification of the public key certificate (device information) is stored in a verification success table 1250. The verification success table 1250 is formed in a memory (holding circuit) in order to store information. Comparison between the device information included in the received message M and the device information stored in the verification success table 1250 is executed in the public key certificate verifying process 1210. When the device information stored in the verification success table 1250 and the device information in the message M matches, a process using the application data included in the received message M is executed in the application execution 1220.
When the device information included in the received message M does not match the device information stored in the verification failure table 1230 and the device information stored in the verification success table 1250, verification of the public key certificate is performed. In the case where the verification of the public key certificate fails, the device information can be supplied to the verification failure table 120 so that the device information stored in the verification failure table 1230 can be updated. On the other hand, in the case where the verification of the public key certificate succeeds, the device information is supplied to the verification success table 1250 so that the device information stored in the verification success table 1250 can be updated. In such a manner, the verification failure table 1230 and the verification success table 1250 can be updated. The updating is executed by, for example, rewriting device information which has elapsed long time with device information which is new in time. Also in the case where the memory in which the verification failure table 1230 and the verification success table 1250 are formed is limited, the memory can be efficiently used.
The functions illustrated in
As described above, the in-vehicle device 102 has the communication control processing unit 210, the signature generation/verification processing unit 230, the driving information acquisition processing unit 240, and the time information acquisition processing, unit 250. The in-vehicle device 102 has a verification result information storing unit 260, a security information storing unit 270, and a driving information storing unit 280. The communication control processing unit 210, the signature generation/verification processing unit 220, the registration determination processing unit 230, the driving information acquisition processing unit 240, and the time information acquisition processing unit 250 are also called processing units 210, 220, 230, 240, and 250, respectively. The verification result information storing unit 260, the security information storing unit 270, and the driving information storing unit 280 are also called storing units 260, 270, and 280, respectively.
The communication control processing unit 210 performs a process for executing communication with the roadside device 101 and the in-vehicle devices 102 mounted on other vehicles. The signature generation/verification processing unit 220 generates a signature of a message to be transmitted to the roadside device 101 or the in-vehicle device 102 mounted on another vehicle. The signature genera ion/verification processing unit 220 also executes a process of verifying a signature of a message received from the roadside device 101 or another in-vehicle device 102 via the communication control processing unit 210 and a process of verifying a message sender and a public key certificate of a certificate authority. The message senders denote here the roadside devices 101 and the other in-vehicle devices 102.
The registration determination processing unit 230 determines whether the result of the verification of the public key certificate made by the signature generation/verification processing unit 220 is held in the in-vehicle device 102 or not and, in the case where the result is held, registers information of the verification result into the verification result information storing unit 260.
The driving information acquisition processing unit 240 acquires information on driving such as the travel direction, the present position, and speed of a vehicle having the in-vehicle device 102 by using, for example, the GPS device 105. The time information acquisition processing unit 250 obtains present time.
The verification result information storing unit 260 stores verification results of the roadside device 101, another in-vehicle device 102, and the public key certificate of the certificate authority, and a policy regarding registration determination. In the diagram, the verification result information storing unit 260 has a verification success device table 261, a verification failure device table 262, verification success certificate authority table 263, verification failure certificate authority table 264, and setting information 265. The verification success device table 261 is a table for registering information of a roadside device or an in-vehicle device succeeded in verification of the public key certificate. The verification failure device table 262 is a table for registering information of a roadside device or an in-vehicle device failed in verification of the public key certificate. The verification success certificate authority table 263 is a table for registering information of a certificate authority succeeded in verification of the public key certificate. The verification failure device table 264 is a table for registering information of a certificate authority failed in verification of the public key certificate. The setting information 265 is a table in which the maximum number of pieces of information which can be registered in each of the tables and various thresholds used for registration determination are set. The details of the verification success device table 261, the verification failure device table 262, the verification success certificate authority table 263, and the verification failure certificate authority table 264 will be described later with reference to
The security information storing unit 270 is a unit for storing security information of the in-vehicle device 102 itself. In the security information storing unit 270, a public key pair 272, a public key certificate 271, and a public key certificate 273 of a certificate authority are stored. The public key pair 272 is made of a secret key for generating signature and a public key for signature verification. The public key is sent together with a message to an in-vehicle device of another vehicle or a roadside device. A device which receives the message (message receiver) uses the public key to verify the signature of the received message. The message receiver is the in-vehicle device mounted on another vehicle or the roadside device. The public key certificate 271 is used by the message receiver to verify the received public key and is issued by a certificate authority. The public key certificate 271 is an identifier for identifying a public key certificate (hereinbelow, called ID (identification)), a public key, and a device ID for identifying a public key owner (an identifier for identifying the device of the message sender and also called as device information in the specification) and is configured by a certificate authority ID for identifying a certificate authority issuing a certificate, expiration date of a certificate, a signature scheme of a certificate, and signature.
The signature is generated by using the secret key of the certificate authority, and the message receiver verifies the public key certificate of the message sender by, using the public key of the certificate authority. The certificate authority public key certificate 273 is provided to verify the public key for verifying the public key certificate.
A plurality of certificate authorities exist and may have a hierarchical structure as illustrated in
Referring again to
The verification failure device table 262 illustrated in
Also in
On receipt of a message via the communication control processing unit 210, the in-vehicle device 102 starts message authentication illustrated in
In the case where the device ID included the received message exists in the verification success device table 261, the message reception time is before the verification result valid time 412, and the public key described (included) in the public key certificate 651 and the public key 413 registered in the verification success device table 261 are the same value, it is regarded that the verification of the public key certificate of the message sender is successful. In this case, the process on verification of the public key certificate is omitted and the routine advances to step 720. Step 720 relates to verification of a signature. Using the public key described (included) in the public key certificate 651 of the message, the signature 653 (
On the other hand, in the case where the device ID included in the received message does not exist as a device within the verification result valid time in the verification success device table 261, the routine advances to step 730. In step 730, a check is made to see whether or not a device ID exists as the device ID 421 within the verification result valid time (
In the case where the device ID exists as the device within the verification result valid time in the verification failure device table 262 in step 730, subsequently, step 740 is executed. In step 740, a check is made to see whether or not the public key and the signature included in the public key, certificate 651 in the received message have the same values as the public key 422 (
As described above, in the case where the device ID included in the received message exists as the device within the verification result valid time in the verification success device table 261 and the public key included in the received message is the same as the public key registered in the verification success device table 261, verification of the public key certificate is omitted, authentication of the message is performed, and the process using the application data can be executed. Consequently, the process load can be lessened. In the case where the device ID included in the received message exists as the device within the verification result valid time in the verification failure device table 262, it is regarded that the public key certificate of the message sender fails in verification, and the message authentication is finished. As a result, the process load can be lessened.
In step 750, verification of the public key certificate of each of the message sender and the certificate authority is executed. In
Referring now to
Concretely, in step 820, an initializing process for checking certificate authorities in order from the low-order certificate authorities 303 is performed. Specifically, process of setting a variable “i” to zero and setting the number of certificate authorities existing in the authentication path to a variable “N” is performed in step 820. In
In step 830, whether public key certificates of all of certificate authorities (it means all of certificate authorities on the authentication path) are checked or not is determined from the relation between the variable “i” and the variable N (in
In the case where it is determined that the public key certificates of all of certificate authorities are not checked in step 830, step 840 is executed. In step 840, a check is made see whether or not the i-th (i=0, . . . , N−1, and N: the number of certificate authorities existing in the authentication path) certificate authority from the low-order certificate authority is registered in the certificate authority ID 531 (
In the case where verification of the public key certificate of any of certificate authorities fails in step 890, or in the case where verification of the public key certificate of the message sender fails, it is regarded that the verification of the public key certificates fails, and the public key certificate verifying process is finished (in
On the other hand, in the case where verification of the public key certificates of all of certificate authorities from the low-order certificate authorities to the (i−1) th certificate authority succeeds in step 890, the public key certificate of the message sender is, verified and, using the result of the verification as a result of verification of the public key certificate, the process is finished.
In the case where the i-th certificate authority is not registered in the verification success certificate authority table 263, step 850 is executed. In step 850, a check is made to see whether the i-th certificate authority is registered in the verification failure certificate authority table 264 or not. In
In step 860, when a certificate authority is not registered in the verification success certificate authority table 263 and the verification failure certificate authority table 264, to check whether a high-order certificate authority is registered or not, the value of the variable “i” is incremented by one. In
First, in step 910, registration determination of the public key certificate of the device is performed. As the details of the registration determination will be described with reference to
Referring again to
In the case where the variable “i” is smaller than the variable N, in step 940, a check is made to see whether or not verification of the public key certificate of the i-th certificate authority of this time is executed without being omitted. In
In step 950, a check is made to see whether or not a verification result of the public key certificate of the i-th certificate authority is already registered in the verification success certificate authority table 263 or the verification failure certificate authority table 264 on the basis of certificate authority ID. In
In step 1130, whether the use frequency of the public key certificate of a certificate authority is high or not is determined. For example, in the case where a certificate authority exists in each of areas and the public key certificate 271 of the in-vehicle device 102 is issued from a certificate authority existing in the residential area of the owner of the vehicle on which the in-vehicle device 102 is mounted, the present position is obtained from the driving information acquisition processing unit 240 (
With respect to a certificate authority whose use frequency is determined high in step 1130, the verification result effective time 532 and 544 is calculated from the use frequency in step 1140. A period in which a vehicle (in-vehicle device 102) exists in an area where a certificate authority whose use frequency is determined to, be high exists is calculated from the present driving information (position information, speed information, and travel direction information) obtained by the travel information acquisition processing unit 240, and the verification result valid time 532 and 544 may be determined so, as to exceed the calculated period. The method of calculating the verification result valid time 532 and 544 is not limited to the above. In the case where a public key certificate is issued from a certificate authority assigned to each of applications, the time may be calculated from average use time of the application. It is also possible to preliminarily register predetermined time information in the setting information 265, obtain new valid time by adding predetermined time information to the present time, and set the obtained valid time as the verification result valid time 532 and 544. In
In step 1150, a verification result of a public key certificate of this time is checked. That is, whether verification of a public key certificate succeeded or failed is determined. In the case where the verification of the public key certificate succeeds, step 1160 is executed. In step 1160, the verification success certificate authority table 263 is updated. On the other hand, in the case where the verification fails, step 1170 is executed. In step 1170, the verification fail re certificate authority table. 264 is updated. The updating in the steps 1160 and 1170 is performed in the case where a device ID is not registered in the verification success certificate authority table 263 and the verification failure certificate authority table 264, or in the case where a public key or a signature of a public key certificate, is different from a public key or a signature of a public key certificate which is already registered. Consequently, at the time of updating in the steps 1160 and 1170, a new certificate authority ID, a public key, the signature of as public key certificate, and verification result valid time are added to the verification success certificate authority table 263 and the verification failure certificate authority table 264. Since the verification success certificate authority table 263 and the verification failure certificate authority table 264 are configured by memories, the amount of information which can be registered is limited. In the case where the information amount reaches the maximum amount of information which can be registered in the table, whether or not there is information which is expired is checked based on the verification result valid time 532 or 544. In the case where there is the information, it is deleted, and a new verification result is registered (steps 1160 and 1170). In the case where there is no information which is expired, information whose valid time is shortest is deleted, and a new verification result is registered (steps 1160 and 1170). In
In step 1030, the position information, speed information, and travel direction information of the in-vehicle device 102 (vehicle) is obtained from the driving information acquisition processing unit 240 of the vehicle on which the in-vehicle device 102 is mounted. In the diagram, it is written as “is travel direction the same or becoming the same?” From the received message M (
On the other hand, in the case where it is determined in step 1030 that the travel directions are the same or becoming closer, step 1040 is performed next. In step 1040 speed difference is obtained from the speed information of the vehicle on which the in-vehicle device 102 is mounted and the speed information 632 (
In step 1050 (described as “calculate valid time” in
With reference to
In step 1060 in
Although an example of storing verification result valid time in a device table has been described in the foregoing embodiment, a valid area may be used in place of the verification result valid time. For example, a valid area corresponding to a device ID is provided in a device table. Depending on whether a device ID is deviated from the valid area or not, updating (addition) on the device table may be determined. Obviously, both of the verification result valid time and the valid area may be stored in a table.
Although a check of evocation of a certificate has not be written in the foregoing embodiment, also in the case where revocation of a certificate is recognized, it can be regarded as a failure in the verification of a public key certificate. Therefore it is to be understood that a failure in verification of a public key certificate includes a case where the certificate is expired, a case where verification of a signature with a public key of a certificate authority fails, and a case where the certificate is revoked.
Although the present invention achieved by the inventors herein has been described concretely above on the basis of the embodiment, obviously, the invention is not limited to the embodiment but can be variously changed without departing from the gist.
Ando, Eriko, Kawauchi, Takashi, Owada, Toru
Patent | Priority | Assignee | Title |
10197402, | Jan 14 2014 | Asahi Kasei Kabushiki Kaisha | Travel direction information output apparatus, map matching apparatus, travel direction information output method, and computer readable medium |
Patent | Priority | Assignee | Title |
7558952, | Oct 10 2003 | Hitachi, LTD | Method and apparatus for accelerating public-key certificate validation |
7831831, | May 09 2002 | Intertrust Technologies Corporation | Authentication communication system, authentication communication apparatus, and authentication communication method |
20050226424, | |||
20060095388, | |||
20080235509, | |||
20080260156, | |||
20110161660, | |||
20120034876, | |||
20130138952, | |||
20130346744, | |||
JP2004032706, | |||
JP2006191695, | |||
JP2007088737, | |||
JP2008060809, | |||
JP2009081524, | |||
JP2012037940, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Aug 30 2013 | ANDO, ERIKO | Renesas Electronics Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 031502 | /0804 | |
Aug 30 2013 | KAWAUCHI, TAKASHI | Renesas Electronics Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 031502 | /0804 | |
Aug 30 2013 | OWADA, TORU | Renesas Electronics Corporation | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 031502 | /0804 | |
Oct 11 2013 | Renesas Electronics Corporation | (assignment on the face of the patent) | / | |||
Aug 06 2015 | Renesas Electronics Corporation | Renesas Electronics Corporation | CHANGE OF ADDRESS | 044928 | /0001 |
Date | Maintenance Fee Events |
Nov 16 2020 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Date | Maintenance Schedule |
May 30 2020 | 4 years fee payment window open |
Nov 30 2020 | 6 months grace period start (w surcharge) |
May 30 2021 | patent expiry (for year 4) |
May 30 2023 | 2 years to revive unintentionally abandoned end. (for year 4) |
May 30 2024 | 8 years fee payment window open |
Nov 30 2024 | 6 months grace period start (w surcharge) |
May 30 2025 | patent expiry (for year 8) |
May 30 2027 | 2 years to revive unintentionally abandoned end. (for year 8) |
May 30 2028 | 12 years fee payment window open |
Nov 30 2028 | 6 months grace period start (w surcharge) |
May 30 2029 | patent expiry (for year 12) |
May 30 2031 | 2 years to revive unintentionally abandoned end. (for year 12) |